Pub Date : 2024-01-12DOI: 10.1109/mce.2024.3353178
Jinghan Sun, Abdulmotaleb El Saddik, Wei Cai
{"title":"Smart Contract as a Service: A Paradigm of Reusing Smart Contract in Web3 Ecosystem","authors":"Jinghan Sun, Abdulmotaleb El Saddik, Wei Cai","doi":"10.1109/mce.2024.3353178","DOIUrl":"https://doi.org/10.1109/mce.2024.3353178","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"44 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-08DOI: 10.1109/mce.2024.3350875
Jiong Dong, Mianxiong Dong, Kaoru Ota
{"title":"Exploring Avatar Experiences in Social VR: A Comprehensive Analysis of User Reviews","authors":"Jiong Dong, Mianxiong Dong, Kaoru Ota","doi":"10.1109/mce.2024.3350875","DOIUrl":"https://doi.org/10.1109/mce.2024.3350875","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"142 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-03DOI: 10.1109/mce.2024.3349458
Branislav M. Todorović, Nenad M. Stojanović, Gordana S. Velikić
{"title":"Is Direct Sequence Spread Spectrum Modulation Promising for AI-Based Design of 6G Networks?","authors":"Branislav M. Todorović, Nenad M. Stojanović, Gordana S. Velikić","doi":"10.1109/mce.2024.3349458","DOIUrl":"https://doi.org/10.1109/mce.2024.3349458","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"22 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-03DOI: 10.1109/mce.2024.3349461
Curtis L. Gittens
{"title":"Dyadic-XV: A Taxonomy of Digital Beings","authors":"Curtis L. Gittens","doi":"10.1109/mce.2024.3349461","DOIUrl":"https://doi.org/10.1109/mce.2024.3349461","url":null,"abstract":"","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"8 1","pages":""},"PeriodicalIF":4.5,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-01DOI: 10.1109/mce.2022.3154357
E. Macedo, Flávia Coimbra Delicato, L. Moraes, G. Fortino
With the outstanding growth in the number of consumer Internet of Things (IoT) connected devices, especially boosted by smart home applications and wearables, there is a need to provide such devices with security. If any device in such consumer IoT systems gets compromised, a data leak may cause serious threats to privacy, material losses, and even put people's lives at risk. Therefore, in this article, we focus on challenges associated with the trust involving communication between IoT devices, which is a key security-related characteristic in consumer IoT applications. A mathematical trust metric, based on a two-level approach, is used to illustrate how the presented proposal can be useful in the objective assessment of confidence and, consequently, provide better security among IoT devices.
{"title":"Assigning Trust to Devices in the Context of Consumer IoT Applications","authors":"E. Macedo, Flávia Coimbra Delicato, L. Moraes, G. Fortino","doi":"10.1109/mce.2022.3154357","DOIUrl":"https://doi.org/10.1109/mce.2022.3154357","url":null,"abstract":"With the outstanding growth in the number of consumer Internet of Things (IoT) connected devices, especially boosted by smart home applications and wearables, there is a need to provide such devices with security. If any device in such consumer IoT systems gets compromised, a data leak may cause serious threats to privacy, material losses, and even put people's lives at risk. Therefore, in this article, we focus on challenges associated with the trust involving communication between IoT devices, which is a key security-related characteristic in consumer IoT applications. A mathematical trust metric, based on a two-level approach, is used to illustrate how the presented proposal can be useful in the objective assessment of confidence and, consequently, provide better security among IoT devices.","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"1 1","pages":"12-21"},"PeriodicalIF":4.5,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62339596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-01DOI: 10.1109/mce.2022.3164529
C. Dehury, S. Srirama, Praveen Kumar Donta, S. Dustdar
The devices at the edge of a network are not only responsible for sensing the surrounding environment but are also made intelligent enough to learn and react to the environment. Clustered Edge Intelligence (CEI) emphasizes intelligence-centric clustering instead of device-centric clustering. It allows the devices to share their knowledge and events with other devices and the remote fog or cloud servers. However, recent advancements facilitate the traceability of the events’ history by analyzing edge devices’ event logs, which are compute intensive and easy to alter. This article focuses on a blockchain-based solution for CEI that makes the edge devices’ events history immutable and easily traceable. This article further explains how the edge devices’ activities and the environmental data can be secured from the source device to the cloud servers. Such a secured CEI mechanism can be applied in establishing a transparent and efficient smart city, supply chain, logistics, and transportation systems.
{"title":"Securing clustered edge intelligence with blockchain","authors":"C. Dehury, S. Srirama, Praveen Kumar Donta, S. Dustdar","doi":"10.1109/mce.2022.3164529","DOIUrl":"https://doi.org/10.1109/mce.2022.3164529","url":null,"abstract":"The devices at the edge of a network are not only responsible for sensing the surrounding environment but are also made intelligent enough to learn and react to the environment. Clustered Edge Intelligence (CEI) emphasizes intelligence-centric clustering instead of device-centric clustering. It allows the devices to share their knowledge and events with other devices and the remote fog or cloud servers. However, recent advancements facilitate the traceability of the events’ history by analyzing edge devices’ event logs, which are compute intensive and easy to alter. This article focuses on a blockchain-based solution for CEI that makes the edge devices’ events history immutable and easily traceable. This article further explains how the edge devices’ activities and the environmental data can be secured from the source device to the cloud servers. Such a secured CEI mechanism can be applied in establishing a transparent and efficient smart city, supply chain, logistics, and transportation systems.","PeriodicalId":54330,"journal":{"name":"IEEE Consumer Electronics Magazine","volume":"1 1","pages":"22-29"},"PeriodicalIF":4.5,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62339720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}